Jump to content

Search the Community

Showing results for tags 'qubes os linux distro'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • News & Announcements
    • BlockForums Announcements
    • Denarius Announcements
    • Kronos Wallet Announcements
    • The Crypto News Feed
  • Cryptocurrency Discussions
    • Cryptocurrencies
    • Altcoin Announcements
    • General Discussion
    • Tutorials & Help
  • Denarius Discussions
    • General Discussion
    • Tutorials & Help
    • Marketing & PR
    • Development
    • Mining & Staking
    • Trading & Exchanges
    • Marketplace
  • Programming & Design
    • Development QA
    • Design QA
  • Gaming
    • Bot Downloads & Discussion
    • Gaming Discussion
  • Classifieds
    • Buy Sell and Trade
  • Other Discussions
    • Element 115
    • The Lounge
    • Hardware & IoT
    • Tutorials & Guides
    • Domains & Hosting

Product Groups

There are no results to display.

Calendars

  • Community Calendar

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


BTC Address

Found 1 result

  1. Guide to installing Qbuntu (Ubuntu 16.04 - Xenial) TemplateVM in Qubes 4.0.2-rc1 fedora-30 as of this writing, I did this on a fresh Qubes install on a Lenovo t450 i7, 8gb ram, 256gb samsung ssd ($280 - ebay) https://www.qubes-os.org/ Some of the initial setup below doesn't work for me as of this writing. Import the Qubes master key gpg --import /usr/share/qubes/qubes-master-key.asc Verify its fingerprint, set as ‘trusted’. This is described here. Download the Qubes developers’ keys. wget https://keys.qubes-os.org/keys/qubes-developers-keys.asc gpg --import qubes-developers-keys.asc Download the latest stable qubes-builder repository: git clone https://github.com/QubesOS/qubes-builder.git /home/user/qubes-builder/ Verify the integrity of the downloaded repository. The last line should read gpg: Good signature from… cd /home/user/qubes-builder/ git tag -v $(git describe) Install the remaining dependencies make install-deps Run the ‘setup’ script located in ‘/home/user/qubes-builder/’ Make sure you are in directory ‘qubes-builder’ cd /home/user/qubes-builder/ ./setup Basic Idea (but does not work, don't even bother trying to decipher their ubuntu guide as its for someone who somehow knows how to do this already) https://www.qubes-os.org/doc/building-archlinux-template/ Reddit Guide (copying some of the steps from this old guide with some edits to work on Qubes 4.0 as this was written for Qubes 3.2) https://www.reddit.com/r/Qubes/comments/5vzg04/idiots_guide_to_installing_qbuntu_ubuntu_1604/ #gpg stuff from qubes themselves reference: https://wiki.qubes.rocks/Security/VerifyingSignatures Lets Begin Clone your fedora-30 vanilla template into a temporary 'builder' we will use to create Ubuntu templates. [user@dom0 ~]$ qvm-clone fedora-30 ubuntu-builder Edit the VM Settings for the newly created template 'ubuntu-builder' (via Qubes Manager GUI), enable 'Allow network access' & increase 'Private storage max size' to 30GB, then start a terminal in ubuntu-builder and initialize GPG [user@ubuntu-builder ~]$ gpg Break out of "type your message..." with CTRL+C, import Qubes master key [user@ubuntu-builder ~]$ gpg --recv-keys 0x36879494 Set trust level for qubes master key [user@ubuntu-builder ~]$ gpg --edit-key 36879494 gpg> trust >Your decision? 5 >Do you really want to set this key to ultimate trust? Y gpg> quit Now retrieve and import Qubes developer keys [user@ubuntu-builder ~]$ wget http://keys.qubes-os.org/keys/qubes-developers-keys.asc [user@ubuntu-builder ~]$ gpg --import qubes-developers-keys.asc #install nano [user@ubuntu-builder ~]$ sudo dnf install nano Install the packages we need to retrieve and run qubes-builder [user@ubuntu-builder ~]$ sudo dnf install git createrepo rpm-build rpm-sign make python-sh rpmdevtools rpm-sign dialog Retrieve the qubes-builder from GIT repository [user@ubuntu-builder ~]$ git clone https://github.com/QubesOS/qubes-builder [user@ubuntu-builder ~]$ cd qubes-builder Edit default config to enable debian_builder only in setup script (example used VI but you can use text editor of your choice, like nano installed above) [user@ubuntu-builder qubes-builder]$ vi example-configs/qubes-os-r4.0.conf (to check our current version installed, go to Qube Manager -> About -> Qubes OS) Change these lines to look like this DIST_DOM0 ?= fc30 DISTS_VM ?= hint: DOM0 distro being fc30 in this Qubes install, & remove "fc30 buster" from above save and exit (shift-z-z if using vi) Setup qubes-builder and compile the template Run the qubes-builder setup script [user@ubuntu-builder qubes-builder]$ ./setup Y to add whats missing then yes to add missing keys this failed on me the first time, I ctrl+c and reran ./setup again, did Y again, and it found the keys that were missing after selecting YES, had to even shutdown the qube and try again as it kept glitching out trying to retrieve keys select 4.0 stable dont select current or current-testing (wtf? is this madness) yes (to only build the template) select xenial+desktop with spacebar and push enter select Builder-rpm builder-debian only, nothing else. (I was using the guide to test installing Bionic 18.04 for screenshots) #now you are back at the command prompt and type these in, one by one. The last 2 will take some time so go to Denarius discord and chat with us while waiting. https://discord.gg/7zcwXJN make install-deps make get-sources make qubes-vm make template We have our Ubuntu 16.04 template, now to install it! Qubes-builder should have created an install script, let's make sure it exists: [user@ubuntu-builder qubes-builder]$ ls -altr qubes-src/linux-template-builder/rpm You should see an 'install-template.sh' file there. Now switch back to your dom0 terminal, and install the template: [user@dom0 ~]$ qvm-run --pass-io ubuntu-builder 'cat /home/user/qubes-builder/qubes-src/linux-template-builder/rpm/install-templates.sh' > install-templates.sh Make the copied script executable and run it [user@dom0 ~]$ chmod +x install-templates.sh [user@dom0 ~]$ ./install-templates.sh #make template (clone) just for denarius, why not in dom0 terminal emulator qvm-clone xenial-desktop denarius-crypto goto qubes-settings for denarius-crypto qube and add your network (I used sys-whonix running tor), run terminal and start to compile the wallet I am choosing color purple background to break out any crypto stuff so I know be careful ignore any errors (pulse audio) #compile denarius QT in template: denarius-crypto sudo apt-get update -y && sudo apt-get upgrade -y sudo apt-get install -y git unzip build-essential libssl-dev libdb++-dev libboost-all-dev libqrencode-dev libminiupnpc-dev libevent-dev autogen automake libtool libqt5gui5 libqt5core5a libqt5dbus5 qttools5-dev qttools5-dev-tools qt5-default git clone https://github.com/carsenk/denarius cd denarius git checkout master git pull qmake "USE_QRCODE=1" "USE_UPNP=1" denarius-qt.pro make -j2 sudo cp Denarius /usr/local/bin #setup appvm with name reference: https://www.qubes-os.org/doc/managing-appvm-shortcuts/ sudo nano /usr/share/applications/denarius.desktop [Desktop Entry] Version=3.3.9.2 Type=Application Terminal=false Icon=/home/user/denarius/src/qt/res/icons/denarius-256.png Name=Denarius GenericName=wallet Comment=Denarius Categories=crypto;cryptocurrency; Exec=Denarius in dom0 run qvm-sync-appmenus denarius-crypto now you can add Denarius to your app selection list in the template select denarius from your template: denarius-crypto and start syncing eet Â
×
×
  • Create New...